IoT and the Implications for Security Inside and Outside the Enterprise. Richard Boyer CISO & Chief Architect, Security

Similar documents
Securing IoT in the Enterprise

F5 Network Security for IoT

Networks of Things. J. Voas Computer Scientist. National Institute of Standards and Technology

Firmware Security: Hot Topics to Watch

IoT Strategy Roadmap

The Art of Low-Cost IoT Solutions

Security of the Internet of Things

Internet of Things: Networking Infrastructure for C.P.S. Wei Zhao University of Macau December 2012

FOR IOT-DRIVEN & BUSINESS

IOT TECHNOLOGY AND ITS IMPACT

ITU-T Y.4552/Y.2078 (02/2016) Application support models of the Internet of things

administration access control A security feature that determines who can edit the configuration settings for a given Transmitter.

IERC Standardization Challenges. Standards for an Internet of Things. 3 and 4 July 2014, ETSI HQ (Sophia Antipolis)

DRIVING REVENUE FROM THE INTERNET OF THINGS

Building Your DLP Strategy & Process. Whitepaper

Securing the Internet of Things Survey

Smart Cities A sua cidade está preparada para um ataque cibernético? Prof. Dr. Fabiano Hessel

IoT Technical foundation and use cases Anders P. Mynster, Senior Consultant High Tech summit DTU FORCE Technology at a glance

Four steps to IoT success

DESIGN PHILOSOPHY We had a Dream...

DM Scheduling Architecture

IoT Evidence Acquisition Issues and Challenges

THE MPI INTERNET OF THINGS STUDY SPONSORED BY BDO

Ex Libris Rosetta Privacy Impact Assessment

ATND Series White Paper

Digital Pathology, The Heart of the Lab, The Birmingham Heartlands Experience. Dr Bruce Tanchel Heart of England NHS Foundation Trust, Birmingham, UK

How to Categorize Risk in IoT

PoE: Adding Power to (IoT)

Internet of Things Conceptual Frameworks and Architecture

Ex Libris. Aleph Privacy Impact Assessment

ITU-T Y Functional framework and capabilities of the Internet of things

Security Challenges in the Internet of Things. Dr. Sigrid Schefer-Wenzl

The Pathway To Ultrabroadband Networks: Lessons From Consumer Behavior

Chapter 2. Analysis of ICT Industrial Trends in the IoT Era. Part 1

Alcatel-Lucent 5910 Video Services Appliance. Assured and Optimized IPTV Delivery

IoT Challenges & Testing aspects. Alon Linetzki, Founder & CEO QualityWize

Network and IT Infrastructure Services for the IoT Store

Redwall. Technologies LLC

Internet of Things Telecommunication operator perspective

SUBVERSIVE MANUFACTURERS COULD RUIN YOUR BUSINESS OPERATORS FACE FINES AND SHUTDOWNS DUE TO FCC CHEAT

Internet of Things: Cross-cutting Integration Platforms Across Sectors

Enduring the IoT storm to unlock new paths to value. How a governance model protects you from a blizzard of IoT risk

DATA LOSS PREVENTION: A HOLISTIC APPROACH

Dr. Tanja Rückert EVP Digital Assets and IoT, SAP SE. MSB Conference Oct 11, 2016 Frankfurt. International Electrotechnical Commission

Evaluation: Polycom s Implementation of H.264 High Profile

Choosing an Oscilloscope


ITU-T Y Specific requirements and capabilities of the Internet of things for big data

Explain Hacking in 10 minutes Lorenzo Grespan. OWASP Newcastle November 2017

Prime Minister's Advisory Council on Cyber Security - Industry Working Group on IoT

DELL: POWERFUL FLEXIBILITY FOR THE IOT EDGE

White Paper. Video-over-IP: Network Performance Analysis

IMPLEMENTATION OF SIGNAL SPACING STANDARDS

PERFACTORY Rapid Prototyping System. Troubleshooting Guide. PERFACTORY Machine

Introduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur

OEM Basics. Introduction to LED types, Installation methods and computer management systems.

DEDICATED TO EMBEDDED SOLUTIONS

Comments of the Authors Guild, Inc. Submitted by Mary Rasenberger, Executive Director

The Internet of You: The Ethical, Privacy, and Legal Implications of Connected Devices. Beverly Kracher, Ph.D. Business Ethics Alliance

RevolutionaryText delivers a SaaS-oriented, patent-pending process developed by Reesa Parker, William Weber, and Harvey Schulman.

IoT Strategy for CSPs Seeking Greater IoT Monetization

DETEXI Basic Configuration

Intelsat-29e Interference Mitigation Testing. Interference Scenarios and Mitigation Techniques Enabled by the Intelsat Epic NG Class Satellites

Interview with Panos Panay For podcast release August 1, 2016

Internet of things (IoT) Regulatory aspects. Trilok Dabeesing, ICT Authority 28 June 2017

MY OPENING KEYNOTE AT INTERNET OF THING S WORLD 2016

Intelsat-29e Interference Mitigation Testing Interference Scenarios and Mitigation Techniques Enabled by the Intelsat Epic NG Class Satellites

What is TEMPEST Chapter 1

IoThings Milano Maggio 2017 Barbara Pareglio GSMA IoT Technical Director. Mobile IoT: 3GPP standard per reti LPWA e IoT security

AXIS M30 Series AXIS M3015 AXIS M3016. User Manual

Remote Director and NEC LCD3090WQXi on GRACoL Coated #1

Architecture of Industrial IoT

Agilent I 2 C Debugging

New forms of video compression

Emerging IoT Technologies for Smart Cities

Addressing the technical challenges for enterprises deploying IoT solutions

Cie L*48.57 a* b* Covering the World. Solutions for paint and coatings color management

P1: OTA/XYZ P2: ABC c01 JWBK457-Richardson March 22, :45 Printer Name: Yet to Come

AXIS M30 Network Camera Series. AXIS M3046-V Network Camera. AXIS M3045 V Network Camera. User Manual

The Internet of Things (IoT) has many potential implications for the manufacturing sector. Revolution in the making

HOW TO DELIVER OMNICHANNEL CUSTOMER ENGAGEMENT, TODAY! , Genesys Telecommunications Laboratories, Inc. All rights reserved.

Last Edit: 19 Feb 2018

Enhancing Performance in Multiple Execution Unit Architecture using Tomasulo Algorithm

IOT TECHNOLOGY & BUSINESS. Format: Online Academy. Duration: 5 Modules

IoT Architecture for Future Building Management Embedded Lighting Controls

Achieving Faster Time to Tapeout with In-Design, Signoff-Quality Metal Fill

HEART ATTACK DETECTION BY HEARTBEAT SENSING USING INTERNET OF THINGS : IOT

SIX DEGREES OF SEPARATION PLANNING THE IMPACT OF IOT ON YOUR FUTURE AUDITS

Analyzing 8b/10b Encoded Signals with a Real-time Oscilloscope Real-time triggering up to 6.25 Gb/s on 8b/10b encoded data streams

Arrangements for: National Progression Award in. Music Performing (SCQF level 6) Group Award Code: G9L6 46. Validation date: November 2009

Internet of Things - IoT Training

Requirements for the Standardization of Hybrid Broadcast/Broadband (HBB) Television Systems and Services

ADDRESSING THE CHALLENGES OF IOT DESIGN JEFF MILLER, PRODUCT MARKETING MANAGER, MENTOR GRAPHICS

VideoEase HDMI 3x1 Switcher Kit (110V) Installation Guide

Machina Research. INDUSTRY DAY - Welcome. Emil Berthelsen, Principal Analyst Crowne Plaza Hotel, Belgrade, Serbia June 1, 2016

Internet of Things (IoT) and Big Data DOAG 2016 Big Data Days

Internet of Things (IoT) Vikram Raval GSMA

EdgeConnect Module Quick Start Guide ITERIS INNOVATION FOR BETTER MOBILITY

Integrating Device Connectivity in IoT & Embedded devices

NDT Meets the Internet of Things (IoT)

Transcription:

IoT and the Implications for Security Inside and Outside the Enterprise Richard Boyer CISO & Chief Architect, Security

1999 2020

INTERNET OF THINGS

THAT S GREAT BUT 4

ALL THINGS ARE NOT ALL EQUAL PERVASIVE NOT ALWAYS CONNECTED UNDERPOWERED AND SECURITY IS AN AFTERTHOUGHT

PERVASIVENESS OF IoT Creates New Infrastructure Dynamics IoT is on its way to being everywhere Especially in other people s infrastructures where you cannot control, modify or hold them accountable. Welcome to the EXONET The scope of IoT pervasiveness is bigger than the traditional Internet boundaries of internal and external and is a fundamental part of IoT. It exists in this greater exonet

WHY IS THIS IMPORTANT? LET S DO THE MATH Gartner 22,000,000,000 - IoT in 2017 * 50% = 11,000,000,000 - Enterprise IoT * 10% = 1,100,000,000 - Sensitive data/mission Critical * 10% = 110,000,000 - In the Exonet HP * 70% = 77,000,000 - IoT w/ security flaws in the Exonet 5,000,000 - Enterprise size companies Assumption Assumption Assumption TOTAL 15.4 138 Vulnerable IoT in the Exonet PER ENTERPRISE Other places in the enterprise

NOT NECESSARILY ALWAYS CONNECTED, YET CREATING MORE DATA, SOME OF WHICH WILL BE HIGHLY SENSITIVE

HOPELESSLY UNDERPOWERED Many IoT devices are low power, low memory, and slow processors Existing security software is too heavy IoT devices may exist in environments where security cannot impact existing infrastructure Existing security paradigms are incompatible IoT devices may have intermittent connectivity Many existing security concepts require significant bandwidth and are always on

SECURITY IS AN AFTERTHOUGHT A large percentage of the current IoT, even in the enterprise, is driven by consumer market thinking.* * If you are worried about selling you the next thing, why would I care about the existing thing? According to Gartner, we ll have 20B additional IoT devices in the enterprise in the next three years 1. According to HP, 70% of existing products have security flaws 2.

IN IoT, PERHAPS, OUR OLD PARADIGMS NEED RETHINKING

WHAT GUIDANCE DO WE HAVE? 5.1 Network Segmentation and Segregation... Network segmentation and Segregation is one of the most effective architectural concepts that an organization can implement to protect its ICS....... There are four common themes that implement the concept of defense-in-depth... 1. Technologies at more than just the network layer. 2. Least privilege and need-to-know. 3. Separate information and infrastructure 4. Implement whitelisting 5.3 Firewalls... Firewalls can further restrict ICS inter-subnet communications between functional security subnets and devices. By employing firewalls to control connectivity to these areas, an organization can prevent unauthorized access to the respective systems and resources within the more sensitive areas. Firewalls for intra-site communications Is this practical in an Exonet world? Absolutely, in some cases. In many cases, probably not

A STRATEGIC CHANGE IN IOT SECURITY THINKING DISTRIBUTED TRUST MUTABILITY AUTONOMY DISPOSABILITY

IoT NEEDS TO HAVE DISTRIBUTED TRUST BUT FIRST, HOW DOES HIERARCHICAL TRUST WORK? Root Certificate Authority Issues Certificate That is embedded in Browser Issues root certificate to lower level authority The browser then can verify the whole chain and trust the connection to the server Intermediate certificate authorities Web Server Issues root certificate to lower level authority Issues certificate to web server Lower level authorities Even Lower level authorities Issues root certificate to lower level authority Any point of compromise in the trust chain, compromises everything below it Now imagine this when you operate 10,000 s of iot devices 14

IoT NEEDS TO HAVE DISTRIBUTED TRUST DISTRIBUTED TRUST ALIGNS WITH DISTRIBUTED IOT Any compromise to any authority Does not compromise the certificates Or any other authority End point receives all parts and assembles certificate. And we already use variations of this commonly in places like P2P networks and things like the space shuttle and aircraft avionics And we can have authorities anywhere 3 or more trust authorities generate part of the certificate and provide to end point 15

IoT NEEDS TO HAVE DISTRIBUTED TRUST With IoT distributed trust lays the foundation for identity everywhere in IoT: The more sensitive the data of an IoT device, the more assurance we need that the data is valid and from the expected source (proof of identity) The more inside exonet we are, the greater the risk of communication disruption, reachability and verification. And the more devices we have, the greater our need for devices to perform confident validation between themselves at the edge and beyond. 16

MUTABILITY CHANGE THE IoT GAME Question to the audience How many people here apply software patches to their phones and laptops moment they become available? How about in our data centers? Cloud Applications?? Simple answer we don t, the risks are too great. Why is that? 17

MUTABILITY CHANGE THE IoT GAME We ve been very good at building fragile applications How many applications are running in the data center UPDATE that restating them takes a 100 step procedure. If we have have a data corruption and have to recover well that s just a disaster Can t we do something different in IoT while a great many of our devices are still simple? 18

MUTABILITY CHANGE THE IoT GAME One potential way to address this is to build in mutability from the beginning and operationalize it. Every so often (Monthly? Weekly? Daily?) blow away the software and the firmware and maybe even add or remove functions regularly, operationally. As as we go along and make IoT complex, if we keep this up, we ve now solved so many security and operational risks. 19

AUTONOMY THINGS NEED THEIR OWN SPACES Thing Thing Thing Bad guys and malware need to reach your things to do most of their work. Being in a completely separate cryptographic communications space closes many holes. Thing Thing 20

DISPOSABILITY In all of security, remediation is probably the hardest task. How do we get back to where we were? How do we fix our problems? How do we do that quickly? Things are not desktops, or servers, or SaaS or any of those traditional human -oriented systems. We need to build many of our things with the assumption, they are, indeed disposable. When something happens, rip and replace. In fact, maybe we should even do this periodically as standard operating procedure

BRING IT TOGETHER DISTRIBUTED TRUST MUTABILITY AUTONOMY DISPOSABILITY Distribute Trust so IoT devices can manage identity from anywhere. Make IoT devices mutable so that we can update constantly Put IoT devices inside their own separate security networks separated from their physical network presence with existing low cost protocols. Dispose and replace at the first sign of issue as a standard practice 22

BRING IT TOGETHER SAID ANOTHER WAY KNOW IF IDENTITY CHANGES CONSTANTLY UPDATE TO LIMIT ATTACKS KEEP OUR THINGS SEPARATE Make Identity easy and everywhere that way we know compromise occurs By constantly updating and replacing, we limit the scope (or stop) the attack BUILD TO DISPOSE AND REPLACE Devices completely separated from the wild west of our internal and public networks you limit or remove the ability to compromise, what you cannot reach cannot be attacked. Operationalizing hacking is expensive, repeating that success is cheap. When we are able to dispose & replace cheaper than the bad guy, we tilt the costs back into our favor. 23

ACCELERATING THE TRANSFORMATION OF IDEAS FROM LAB TO MARKET http://www.ntti3.com https://twitter.com/ntti3 https://www.linkedin.com/company/nttinnovationinstitute https://www.facebook.com/nttinnovation https://www.youtube.com/user/ntti3channel 24